Book Description to Finelybook sortingKey Features
Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costsBook Description to Finelybook sorting
This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network-directly attacking the end user.
This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.
What you will learn
Select and configure the most effective tools from Kali Linux to test network security
Employ stealth to avoid detection in the network being tested
Recognize when stealthy attacks are being used against your network
Exploit networks and data systems using wired and wireless networks as well as web services
Identify and download valuable data from target systems
Maintain access to compromised systems
Use social engineering to compromise the weakest part of the network-the end usersContents
Chapter 1. Getting Up and Running with Cassandra
Chapter 2. The First Table
Chapter 3. Organizing Related Data
Chapter 4. Beyond Key-Value Lookup
Chapter 5. Establishing Relationships
Chapter 6. Denormalizing Data for Maximum Performance
Chapter 7. Expanding Your Data Model
Chapter 8. Collections, Tuples, and User-Defined Types
Chapter 9. Aggregating Time-Series Data
Chapter 10. How Cassandra Distributes Data
Chapter 11. Cassandra Multi-Node Cluster
Chapter 12. Application Development Using the Java Driver
Chapter 13. Peeking under the Hood
Chapter 14. Authentication and Authorization